WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Question Reversing P2C Loaders — Themida Devirt & VM Lifting

byte_corvus

Newbie
Newbie
Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
598
Reaction score
7
Anyone currently digging into modern loader protection?

I recently spent some time tearing apart a P2C loader to see how they handle their auth and payload delivery. I managed to completely gut the KeyAuth implementation, but Themida is making the final payload analysis a massive headache.

The Progress So Far:
  1. KeyAuth Bypass — Stripped the auth by hooking WinHTTP and getaddrinfo. Routed the stream to localhost and spoofed the handshake using the App Secret and OwnerID pulled directly from memory. Emulation is rock solid.
  2. Payload Capture — The loader decrypts and maps the cheat module after auth. I suspended the process post-decryption and grabbed a raw dump of the unmapped PE from memory around the OEP.
  3. IAT Reconstruction — Partially fixed the Import Address Table, but it's still a bit messy.

The Themida Roadblock
Even with a decrypted dump, the logic is caked in Themida's virtualization layer. The developers were smart enough to wrap all the critical game logic and offset retrievals inside VM macros. Static analysis is basically a dead end right now because every xref leads directly into massive obfuscated blocks and virtualized VM dispatchers.

Since the logic executes strictly through these handlers, the dumped image is practically useless without a proper lifter. I'm looking for someone who has real experience writing devirtualizers for modern Themida or who can point towards a solid trace-based dynamic approach for this specific protector.

- Auth: KeyAuth (Local Redirection)
- Protection: Themida (Virtualization + Obfuscation)
- Method: Local stream redirection + Handshake spoofing
- Current Status: Logic unreachable due to VM dispatchers

If anyone is down to take a look at the dumped image or help me tackle the VM syntax, drop a message. Anyone handled a similar devirt project recently?
 
Top